In an SMB relay attack, what does the attacker typically do with the intercepted SMB credentials?   Directly decrypts them to obtain plaintext passwords Relays them to another server to authenticate as the victim Stores them for later use in a different type of attack Uses them to generate a denial of service attack

icon
Related questions
Question

In an SMB relay attack, what does the attacker typically do with the intercepted SMB credentials?

 

Directly decrypts them to obtain plaintext passwords

Relays them to another server to authenticate as the victim

Stores them for later use in a different type of attack

Uses them to generate a denial of service attack

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer